Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics

Theses/Dissertations

2020

Machine learning

Institution
Publication

Articles 1 - 30 of 40

Full-Text Articles in Entire DC Network

Reasoning About User Feedback Under Identity Uncertainty In Knowledge Base Construction, Ariel Kobren Dec 2020

Reasoning About User Feedback Under Identity Uncertainty In Knowledge Base Construction, Ariel Kobren

Doctoral Dissertations

Intelligent, automated systems that are intertwined with everyday life---such as Google Search and virtual assistants like Amazon’s Alexa or Apple’s Siri---are often powered in part by knowledge bases (KBs), i.e., structured data repositories of entities, their attributes, and the relationships among them. Despite a wealth of research focused on automated KB construction methods, KBs are inevitably imperfect, with errors stemming from various points in the construction pipeline. Making matters more challenging, new data is created daily and must be integrated with existing KBs so that they remain up-to-date. As the primary consumers of KBs, human users have tremendous potential to …


Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang Dec 2020

Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang

Computational Modeling & Simulation Engineering Theses & Dissertations

Traffic incident analysis is a crucial task in traffic management centers (TMCs) that typically manage many highways with limited staff and resources. An effective automatic incident analysis approach that can report abnormal events timely and accurately will benefit TMCs in optimizing the use of limited incident response and management resources. During the past decades, significant efforts have been made by researchers towards the development of data-driven approaches for incident analysis. Nevertheless, many developed approaches have shown limited success in the field. This is largely attributed to the long detection time (i.e., waiting for overwhelmed upstream detection stations; meanwhile, downstream stations …


New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger Nov 2020

New Methods For Deep Learning Based Real-Valued Inter-Residue Distance Prediction, Jacob Barger

Theses

Background: Much of the recent success in protein structure prediction has been a result of accurate protein contact prediction--a binary classification problem. Dozens of methods, built from various types of machine learning and deep learning algorithms, have been published over the last two decades for predicting contacts. Recently, many groups, including Google DeepMind, have demonstrated that reformulating the problem as a multi-class classification problem is a more promising direction to pursue. As an alternative approach, we recently proposed real-valued distance predictions, formulating the problem as a regression problem. The nuances of protein 3D structures make this formulation appropriate, allowing predictions …


Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak Nov 2020

Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak

USF Tampa Graduate Theses and Dissertations

The commercial platforms that use recommender systems can collect relevant information to produce useful recommendations to the platform users. However, these sources usually contain missing values, imbalanced and heterogeneous data, and noisy observations. Such characteristics render the process of exploiting the information nontrivial, as one should carefully address them during the data fusion process. In addition to the degenerative characteristics, some entries can be fake, i.e., they can be the outcomes of malicious intents to manipulate the system. These entries should be eliminated before incorporation to any recommendation task. Detecting such malicious attacks quickly and accurately and then mitigating them …


Detection Of Stealthy False Data Injection Attacks Against State Estimation In Electric Power Grids Using Deep Learning Techniques, Qingyu Ge Aug 2020

Detection Of Stealthy False Data Injection Attacks Against State Estimation In Electric Power Grids Using Deep Learning Techniques, Qingyu Ge

Theses and Dissertations

Since communication technologies are being integrated into smart grid, its vulnerability to false data injection is increasing. State estimation is a critical component which is used for monitoring the operation of power grid. However, a tailored attack could circumvent bad data detection of the state estimation, thus disturb the stability of the grid. Such attacks are called stealthy false data injection attacks (FDIAs). This thesis proposed a prediction-based detector using deep learning techniques to detect injected measurements. The proposed detector adopts both Convolutional Neural Networks and Recurrent Neural Networks, making full use of the spatial-temporal correlations in the measurement data. …


Applications Of Artificial Intelligence And Graphy Theory To Cyberbullying, Jesse D. Simpson Aug 2020

Applications Of Artificial Intelligence And Graphy Theory To Cyberbullying, Jesse D. Simpson

MSU Graduate Theses

Cyberbullying is an ongoing and devastating issue in today's online social media. Abusive users engage in cyber-harassment by utilizing social media to send posts, private messages, tweets, or pictures to innocent social media users. Detecting and preventing cases of cyberbullying is crucial. In this work, I analyze multiple machine learning, deep learning, and graph analysis algorithms and explore their applicability and performance in pursuit of a robust system for detecting cyberbullying. First, I evaluate the performance of the machine learning algorithms Support Vector Machine, Naïve Bayes, Random Forest, Decision Tree, and Logistic Regression. This yielded positive results and obtained upwards …


Applying Deep Learning For Cell Detection In Time-Lapse Microscopic Images, Jay Patel Aug 2020

Applying Deep Learning For Cell Detection In Time-Lapse Microscopic Images, Jay Patel

Honors Theses

The budding yeast Saccharomyces cerevisiae is an effective model for studying cellular aging. We can measure the lifespan of yeast cells in two ways: replicative and chronological lifespans. Chronological focuses on the time that a cell can survive. The replicative lifespan (RLS) is the number of cell divisions that a single mother cell can go through before ceases to be dividing. RLS is a measurement of individual cells and is more informative on the aging process than in chronological lifespan. Many genes that influence yeast RLS have been shown to be highly conserved and have a similar effect on aging …


Free Space Detection And Trajectory Planning For Autonomous Robot, Zachary Ross Winger Jun 2020

Free Space Detection And Trajectory Planning For Autonomous Robot, Zachary Ross Winger

Computer Science and Software Engineering

Autonomous robots need to know what is around them and where it is safe for them to move to. Because having this ability is so important, Dr. Seng and myself have created a model to predict the free space in front of his autonomous robot, Herbie. We then use this prediction to enforce a driving policy to ensure Herbie drives around safely.


Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson Jun 2020

Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson

Honors Theses

The purpose of this project was to implement a human facial emotion recognition system in a real-time, mobile setting. There are many aspects of daily life that can be improved with a system like this, like security, technology and safety.

There were three main design requirements for this project. The first was to get an accuracy rate of 70%, which must remain consistent for people with various distinguishing facial features. The second goal was to have one execution of the system take no longer than half of a second to keep it as close to real time as possible. Lastly, …


Using Generative Adversarial Networks To Classify Structural Damage Caused By Earthquakes, Gian P. Delacruz Jun 2020

Using Generative Adversarial Networks To Classify Structural Damage Caused By Earthquakes, Gian P. Delacruz

Master's Theses

The amount of structural damage image data produced in the aftermath of an earthquake can be staggering. It is challenging for a few human volunteers to efficiently filter and tag these images with meaningful damage information. There are several solution to automate post-earthquake reconnaissance image tagging using Machine Learning (ML) solutions to classify each occurrence of damage per building material and structural member type. ML algorithms are data driven; improving with increased training data. Thanks to the vast amount of data available and advances in computer architectures, ML and in particular Deep Learning (DL) has become one of the most …


Transfer Learning: Bridging The Gap Between Deep Learning And Domain-Specific Text Mining, Chaoran Cheng May 2020

Transfer Learning: Bridging The Gap Between Deep Learning And Domain-Specific Text Mining, Chaoran Cheng

Dissertations

Inspired by the success of deep learning techniques in Natural Language Processing (NLP), this dissertation tackles the domain-specific text mining problems for which the generic deep learning approaches would fail. More specifically, the domain-specific problems are: (1) success prediction in crowdfunding, (2) variants identification in biomedical literature, and (3) text data augmentation for domains with low-resources.

In the first part, transfer learning in a multimodal perspective is utilized to facilitate solving the project success prediction on the crowdfunding application. Even though the information in a project profile can be of different modalities such as text, images, and metadata, most existing …


Efficient Hardware Implementations Of Bio-Inspired Networks, Anakha Vasanthakumaribabu May 2020

Efficient Hardware Implementations Of Bio-Inspired Networks, Anakha Vasanthakumaribabu

Dissertations

The human brain, with its massive computational capability and power efficiency in small form factor, continues to inspire the ultimate goal of building machines that can perform tasks without being explicitly programmed. In an effort to mimic the natural information processing paradigms observed in the brain, several neural network generations have been proposed over the years. Among the neural networks inspired by biology, second-generation Artificial or Deep Neural Networks (ANNs/DNNs) use memoryless neuron models and have shown unprecedented success surpassing humans in a wide variety of tasks. Unlike ANNs, third-generation Spiking Neural Networks (SNNs) closely mimic biological neurons by operating …


Analysis Of Gameplay Strategies In Hearthstone: A Data Science Approach, Connor W. Watson May 2020

Analysis Of Gameplay Strategies In Hearthstone: A Data Science Approach, Connor W. Watson

Theses

In recent years, games have been a popular test bed for AI research, and the presence of Collectible Card Games (CCGs) in that space is still increasing. One such CCG for both competitive/casual play and AI research is Hearthstone, a two-player adversarial game where players seeks to implement one of several gameplay strategies to defeat their opponent and decrease all of their Health points to zero. Although some open source simulators exist, some of their methodologies for simulated agents create opponents with a relatively low skill level. Using evolutionary algorithms, this thesis seeks to evolve agents with a higher skill …


Using Machine Learning To Optimize Predictive Models Used For Big Data Analytics In Various Sports Events, Akhil Kumar Gour May 2020

Using Machine Learning To Optimize Predictive Models Used For Big Data Analytics In Various Sports Events, Akhil Kumar Gour

Master's Projects

In today’s world, data is growing in huge volume and type day by day. Historical data can hence be leveraged to predict the likelihood of the events which are to occur in the future. This process of using statistical or any other form of data to predict future outcomes is commonly termed as predictive modelling. Predictive modelling is becoming more and more important and is trending because of several reasons. But mainly, it enables businesses or individual users to gain accurate insights and allows to decide suitable actions for a profitable outcome.

Machine learning techniques are generally used in order …


Yoga Pose Classification Using Deep Learning, Shruti Kothari May 2020

Yoga Pose Classification Using Deep Learning, Shruti Kothari

Master's Projects

Human pose estimation is a deep-rooted problem in computer vision that has exposed many challenges in the past. Analyzing human activities is beneficial in many fields like video- surveillance, biometrics, assisted living, at-home health monitoring etc. With our fast-paced lives these days, people usually prefer exercising at home but feel the need of an instructor to evaluate their exercise form. As these resources are not always available, human pose recognition can be used to build a self-instruction exercise system that allows people to learn and practice exercises correctly by themselves. This project lays the foundation for building such a system …


Using Color Thresholding And Contouring To Understand Coral Reef Biodiversity, Scott Vuong Tran May 2020

Using Color Thresholding And Contouring To Understand Coral Reef Biodiversity, Scott Vuong Tran

Master's Projects

This paper presents research outcomes of understanding coral reef biodiversity through the usage of various computer vision applications and techniques. It aims to help further analyze and understand the coral reef biodiversity through the usage of color thresholding and contouring onto images of the ARMS plates to extract groups of microorganisms based on color. The results are comparable to the manual markup tool developed to do the same tasks and shows that the manual process can be sped up using computer vision. The paper presents an automated way to extract groups of microorganisms based on color without the use of …


Understanding Impact Of Twitter Feed On Bitcoin Price And Trading Patterns, Ashrit Deebadi May 2020

Understanding Impact Of Twitter Feed On Bitcoin Price And Trading Patterns, Ashrit Deebadi

Master's Projects

‘‘Cryptocurrency trading was one of the most exciting jobs of 2017’’. ‘‘Bit- coin’’,‘‘Blockchain’’, ‘‘Bitcoin Trading’’ were the most searched words in Google during 2017. High return on investment has attracted many people towards this crypto market. Existing research has shown that the trading price is completely based on speculation, and its trading volume is highly impacted by news media. This paper discusses the existing work to evaluate the sentiment and price of the cryptocurrency, the issues with the current trading models. It builds possible solutions to understand better the semantic orientation of text by comparing different machine learning techniques and …


Detecting Credit Card Fraud: An Analysis Of Fraud Detection Techniques, William Lovo May 2020

Detecting Credit Card Fraud: An Analysis Of Fraud Detection Techniques, William Lovo

Senior Honors Projects, 2020-current

Advancements in the modern age have brought many conveniences, one of those being credit cards. Providing an individual the ability to hold their entire purchasing power in the form of pocket-sized plastic cards have made credit cards the preferred method to complete financial transactions. However, these systems are not infallible and may provide criminals and other bad actors the opportunity to abuse them. Financial institutions and their customers lose billions of dollars every year to credit card fraud. To combat this issue, fraud detection systems are deployed to discover fraudulent activity after they have occurred. Such systems rely on advanced …


Towards Natural Language Understanding In Text-Based Games, Anthony Snarr May 2020

Towards Natural Language Understanding In Text-Based Games, Anthony Snarr

Senior Honors Projects, 2020-current

Text-based games are a very promising space for language-focused machine learning. Within them are huge hurdles in machine learning, like long-term planning and memory, interpretation and generation of natural language, unpredictability, and more. One problem to consider in the realm of natural language interpretation is how to train a machine learning model to understand a text-based game’s objective. This work considers treating this issue like a machine translation problem, where a detailed objective or list of instructions is given as input, and output is a predicted list of actions. This work also explores how a supervised learning system might learn …


Superb: Superior Behavior-Based Anomaly Detection Defining Authorized Users' Traffic Patterns, Daniel Karasek May 2020

Superb: Superior Behavior-Based Anomaly Detection Defining Authorized Users' Traffic Patterns, Daniel Karasek

Master of Science in Computer Science Theses

Network anomalies are correlated to activities that deviate from regular behavior patterns in a network, and they are undetectable until their actions are defined as malicious. Current work in network anomaly detection includes network-based and host-based intrusion detection systems. However, network anomaly detection schemes can suffer from high false detection rates due to the base rate fallacy. When the detection rate is less than the false positive rate, which is found in network anomaly detection schemes working with live data, a high false detection rate can occur. To overcome such a drawback, this paper proposes a superior behavior-based anomaly detection …


Development Of Fully Balanced Ssfp And Computer Vision Applications For Mri-Assisted Radiosurgery (Mars), Jeremiah Sanders May 2020

Development Of Fully Balanced Ssfp And Computer Vision Applications For Mri-Assisted Radiosurgery (Mars), Jeremiah Sanders

Dissertations & Theses (Open Access)

Prostate cancer is the second most common cancer in men and the second-leading cause of cancer death in men. Brachytherapy is a highly effective treatment option for prostate cancer, and is the most cost-effective initial treatment among all other therapeutic options for low to intermediate risk patients of prostate cancer. In low-dose-rate (LDR) brachytherapy, verifying the location of the radioactive seeds within the prostate and in relation to critical normal structures after seed implantation is essential to ensuring positive treatment outcomes.

One current gap in knowledge is how to simultaneously image the prostate, surrounding anatomy, and radioactive seeds within the …


A Framework For Vector-Weighted Deep Neural Networks, Carter Chiu May 2020

A Framework For Vector-Weighted Deep Neural Networks, Carter Chiu

UNLV Theses, Dissertations, Professional Papers, and Capstones

The vast majority of advances in deep neural network research operate on the basis of a real-valued weight space. Recent work in alternative spaces have challenged and complemented this idea; for instance, the use of complex- or binary-valued weights have yielded promising and fascinating results. We propose a framework for a novel weight space consisting of vector values which we christen VectorNet. We first develop the theoretical foundations of our proposed approach, including formalizing the requisite theory for forward and backpropagating values in a vector-weighted layer. We also introduce the concept of expansion and aggregation functions for conversion between real …


Automated Digit Recognition On Sound Pressure Level Meters Based On Deep Learning, Che-Wei Tung May 2020

Automated Digit Recognition On Sound Pressure Level Meters Based On Deep Learning, Che-Wei Tung

Theses and Dissertations

Sound pressure level (SPL) meter is one of the useful devices used for measuring the sound level pressure. The measurement device displays the SPL value in decibels (dB) on a standard LCD screen (no backlight). We could base on the digit number shown on the LCD screen to do some adjustments or evaluations. Thus, SPL has been widely used in several fields to quantify different noise, such as industrial, environmental, and aircraft noise. However, in my basic knowledge, there is no previous study used machine learning to auto-recognize the digit on the SPL meter. This thesis presents a novel system …


Applying Imitation And Reinforcement Learning To Sparse Reward Environments, Haven Brown May 2020

Applying Imitation And Reinforcement Learning To Sparse Reward Environments, Haven Brown

Computer Science and Computer Engineering Undergraduate Honors Theses

The focus of this project was to shorten the time it takes to train reinforcement learning agents to perform better than humans in a sparse reward environment. Finding a general purpose solution to this problem is essential to creating agents in the future capable of managing large systems or performing a series of tasks before receiving feedback. The goal of this project was to create a transition function between an imitation learning algorithm (also referred to as a behavioral cloning algorithm) and a reinforcement learning algorithm. The goal of this approach was to allow an agent to first learn to …


Truck Trailer Classification Using Side-Fire Light Detection And Ranging (Lidar) Data, Olcay Sahin Apr 2020

Truck Trailer Classification Using Side-Fire Light Detection And Ranging (Lidar) Data, Olcay Sahin

Civil & Environmental Engineering Theses & Dissertations

Classification of vehicles into distinct groups is critical for many applications, including freight and commodity flow modeling, pavement management and design, tolling, air quality monitoring, and intelligent transportation systems. The Federal Highway Administration (FHWA) developed a standardized 13-category vehicle classification ruleset, which meets the needs of many traffic data user applications. However, some applications need high-resolution data for modeling and analysis. For example, the type of commodity being carried must be known in the freight modeling framework. Unfortunately, this information is not available at the state or metropolitan level, or it is expensive to obtain from current resources.

Nevertheless, using …


Learning Latent Characteristics Of Data And Models Using Item Response Theory, John P. Lalor Mar 2020

Learning Latent Characteristics Of Data And Models Using Item Response Theory, John P. Lalor

Doctoral Dissertations

A supervised machine learning model is trained with a large set of labeled training data, and evaluated on a smaller but still large set of test data. Especially with deep neural networks (DNNs), the complexity of the model requires that an extremely large data set is collected to prevent overfitting. It is often the case that these models do not take into account specific attributes of the training set examples, but instead treat each equally in the process of model training. This is due to the fact that it is difficult to model latent traits of individual examples at the …


Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé Mar 2020

Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé

Theses and Dissertations

A holistic approach to the algorithm selection problem is presented. The “algorithm selection framework" uses a combination of user input and meta-data to streamline the algorithm selection for any data analysis task. The framework removes the conjecture of the common trial and error strategy and generates a preference ranked list of recommended analysis techniques. The framework is performed on nine analysis problems. Each of the recommended analysis techniques are implemented on the corresponding data sets. Algorithm performance is assessed using the primary metric of recall and the secondary metric of run time. In six of the problems, the recall of …


Computer Vision Gesture Recognition For Rock Paper Scissors, Nicholas Hunter Jan 2020

Computer Vision Gesture Recognition For Rock Paper Scissors, Nicholas Hunter

Senior Independent Study Theses

This project implements a human versus computer game of rock-paper-scissors using machine learning and computer vision. Player’s hand gestures are detected using single images with the YOLOv3 object detection system. This provides a generalized detection method which can recognize player moves without the need for a special background or lighting setup. Additionally, past moves are examined in context to predict the most probable next move of the system’s opponent. In this way, the system achieves higher win rates against human opponents than by using a purely random strategy.


Comparing Predictive Performance Of Statistical Learning Models On Medical Data, Francis Biney Jan 2020

Comparing Predictive Performance Of Statistical Learning Models On Medical Data, Francis Biney

Open Access Theses & Dissertations

This work investigates the predictive performance of 10 Machine learning models on three medical data including Breast cancer, Heart disease and Prostate cancer. Furthermore, we use the models to identify risk factors that contribute significantly to these diseases.

The models considered include; Logistic regression with L1 and L_2 penalties, Principal component logistic regression(PCR-LR), Partial least squares logistic regression(PLS-LR), Multivariate adaptive regression splines(MARS), Support vector machine with Radial Basis Kernel (SVM-RBK), Random Forest(RF), Gradient Boosting Machines(GBM), Elastic Net (Enet) and Feedforward Neural Network(FFNN). The models were grouped according to their similarities and learning style; i) Linear regularized models: LR-Lasso, LR-Ridge and …


Automated Recognition Of Facial Affect Using Deep Neural Networks, Behzad Hasani Jan 2020

Automated Recognition Of Facial Affect Using Deep Neural Networks, Behzad Hasani

Electronic Theses and Dissertations

Automated Facial Expression Recognition (FER) has been a topic of study in the field of computer vision and machine learning for decades. In spite of efforts made to improve the accuracy of FER systems, existing methods still are not generalizable and accurate enough for use in real-world applications. Many of the traditional methods use hand-crafted (a.k.a. engineered) features for representation of facial images. However, these methods often require rigorous hyper-parameter tuning to achieve favorable results.

Recently, Deep Neural Networks (DNNs) have shown to outperform traditional methods in visual object recognition. DNNs require huge data as well as powerful computing units …